Abstract: This paper addresses low power MAC pro- characteristic of access points is that they are assumed
tocols for the downlink of infrastructure wireless sensor to be energy unconstrained. In this sense, this work can
networks. We are interested in the trade-off between power also apply to clustered ad hoc networks with solar pow-
consumption and transmission delay, focusing on low traf- ered cluster heads, as proposed in [4]. Finally, one can
fic. We describe WiseMAC (Wireless Sensor MAC), a new imagine a vehicle mounted mobile access point moving
protocol for the downlink of infrastructure wireless sen-
through an cloud of sensors to collect data.
sor networks. Another original contribution is the anal-
ysis of the performance of PTIP (Periodic Terminal Initi- An energy efficient wireless MAC protocol should
ated Polling). Here, polling is used in the reversed direc- minimize the four sources of energy waste [5]: idle lis-
tion as compared to common polling protocols. WiseMAC tening, overhearing, collisions and protocol overhead.
and PTIP are compared with PSM, the power save proto- Idle listening refers to the active listening to an idle chan-
col used in both the IEEE 802.11 and IEEE 802.15.4 Zig-
nel, waiting for a potential packet to arrive. Overhearing
Bee standards. Analytical expressions are given for the
power consumption and the transmission delay for each
refers to the reception of a packet, or of part of a packet,
protocol, as a function of the wake-up period. It is shown that is destined to another node. Collisions should of
that WiseMAC provides, for the same delay, a significantly course be avoided as retransmissions cost energy. Fi-
lower power consumption than PSM. Although less energy nally, protocol overhead refers to the frame headers and
efficient than WiseMAC and PSM, it is shown that PTIP the signalling required by the MAC protocol.
can, thanks to its implementation simplicity, become at-
tractive for applications tolerating large transmission de-
As the power consumption of a transceiver in receive
lays1 . mode is far from being negligible, idle listening can be-
come the main source of energy waste, especially in low
1 Introduction traffic conditions. To reach a low average power con-
sumption, the transceiver must be shut down part of the
Inexpensive integrated system-on-a-chip devices
time (i.e. duty cycling).
comprising a radio transceiver and a microcontroller
have been since a few years a subject of research [1, 2]. In infrastructure networks, one must distinguish the
Industry is now selling such devices [3]. They will downlink (access point to sensor nodes) from the uplink
permit to implement ubiquitous computing applications (sensor nodes to access point). In the downlink direction,
where small battery powered nodes are interconnected the challenge is to transmit data from the access point to
via a wireless network. As now widely recognized, one some sensor node, without requiring the sensor node to
of the main issues is the power consumption of such continuously listen to the channel. The MAC protocol
devices. must mainly mitigate idle listening and overhearing on
1.1 Problem Statement the sensor nodes. The problem is different in the uplink
This paper discusses the power consumption of direction. As the access point is not energy limited, it
medium access control protocols in an infrastructure can listen all the time to the channel. The uplink MAC
wireless sensor network, focusing on low downlink traf- protocol requires no wake-up scheme. The issue to re-
fic. The term ”sensor” is used to emphasize the low solve in the uplink direction is the multiple access to a
power requirement. The mobile nodes considered in this shared medium. If the system is operated near capacity,
paper may be sensors (e.g. fire alarm), but also other this problem is very complex. However, if only a mod-
kinds of devices such as actuators, personal digital assis- erate traffic is present on the channel, the simple non-
tants, etc. persistent CSMA protocol [6] can clearly approach the
Unlike most research dealing with wireless sensor net- ideal case, with no idle listening, no overhearing and lit-
works, we do not consider an ad hoc multi-hop network tle collisions. In this paper, we will therefore focus on
topology, but an infrastructure network. An infrastruc- the downlink problem.
ture network is composed of a number of access points Sensor networks are usually meant for the acquisi-
interconnected through a backbone network. Each ac- tion of data, either periodically or based on events (e.g.
cess point is serving a number of sensor nodes. Such a alarms). The uplink traffic can be expected to be high,
topology can be envisaged for example in smart build- at least during certain periods. On the other hand, the
ing applications, where the Ethernet or powerline ca- downlink is foreseen to carry configuration and query-
bling can be used for the backbone network. The main ing traffic. With such a traffic, inter-arrivals measured
1 The work presented in this paper was supported in part by the
in minutes or hours will be common. We will assume
National Competence Center in Research on Mobile Information and
throughout this paper that the inter-arrival between pack-
Communication Systems (NCCR-MICS), a center supported by the ets is much larger than the time needed to transmit a
Swiss National Science Foundation under grant number 5005-67322. packet.
1.2 Original Contributions 1.4 Paper Organization
This paper contains two original contributions. The The rest of the paper is organized as follows: Section 2
first one is the proposal of WiseMAC (Wireless Sensor describes the mentioned low power MAC protocols. The
MAC) for the downlink of infrastructure wireless sen- power consumption and the delay of these protocols are
sor networks. This protocol has been proposed in [7] given in Section 3. A performance comparison is made
for multi-hop wireless sensor networks. We show here in Section 4. Section 5 contains the main findings from a
that it is also of interest for infrastructure wireless sen- sensitivity analysis. Section 6 gives concluding remarks.
sor networks. The second contribution is the analysis of
the Periodic Terminal Initiated Polling protocol (PTIP). 2 Low Power Downlink MAC Protocols
Polling protocols are usually used to poll mobile stations Before proceeding to the description of the protocols,
from a central access point in order to avoid collisions in let us define models for the radio transceiver and the traf-
the uplink direction [8]. In this paper, we analyze the re- fic.
versed usage of polling, for the downlink direction. Such
2.1 Radio Model
a usage of polling has received little attention from the
research community, because it is very inefficient in high When considering low power protocols, it is very im-
traffic conditions. We show that this simple protocol can portant to model precisely the transition delays between
become attractive in certain conditions. WiseMAC and the different states of a transceiver and the power con-
PTIP are compared with the power save protocol used in sumption in those states. The following states can be
IEEE 802.11 [9] and IEEE 802.15.4 ZigBee [10] and to identified:
an hypothetic ideal protocol.
DOZE The transceiver is not able to transmit nor re-
1.3 Related Work
ceive, but is ready to quickly power on into the re-
A large effort has been devoted by the research com- ceive or the transmit state,
munity to the development of medium access control
protocols for wireless computer networks [6, 11]. Such RX The transceiver is listening to the channel (receiving
protocols have been primarily designed to minimize the data or trying to demodulate data out of a noisy or
delay and to maximize the throughput. The power con- idle channel),
sumption has only later become an issue of large inter-
est. In [12], a comparison between the power consump- TX The transceiver is transmitting data.
tion of several wireless MAC protocols is given. In their
analysis, the authors focused on high traffic conditions.
In this paper, we focus, in the contrary, on low traffic The power consumed in these states will be denoted
conditions. Low traffic is expected to be very common as PZ , PR and PT . To simplify analytical expressions,
in many applications of ubiquitous computing, where a we define PbR = PR −PZ as the increment in power con-
very long lifetime is required. It is therefore necessary sumption caused by being in the RX state (as compared
to understand and minimize the energy consumption of to the DOZE state), and PbT = PT − PZ as the increment
MAC protocols in low traffic conditions. in power consumption caused by being in the TX state.
We denote with TS the setup time required to turn on
Research on ultra low power MAC protocols for ad
the transceiver into the RX state, starting from the DOZE
hoc wireless sensor network has started a few years ago.
state. We finally denote with TT the turn-around time
A number of proposals are available, from which one
which is required to switch the transceiver between the
can cite S-MAC [5], Piconet [13] and wake-up radio [2].
RX and TX states. During the state change phases, we
Protocols for ad hoc sensor networks can potentially be
assume that the transceiver consumes a power PR , as
interesting for the downlink of infrastructure sensor net-
all electronics is powered on at the exception of the last
works. For example, the Piconet protocol can be seen as
stage RF power amplifier.
a distributed version of PTIP. The wake-up radio scheme
would certainly be of interest for the downlink of infras- 2.2 Traffic Model
tructure networks, if a wake-up radio receiver hardware We consider a population of N sensor nodes under
consuming almost nothing becomes a reality. The work the responsibility of one access point. Downlink Poisson
presented in this paper differs from previous research on traffic arrives at the access point from the fixed network
λ
MAC protocols for sensor networks, mainly because we at a global rate λ. We assume that an equal part N of this
focus on an infrastructure topology, and investigate how traffic is destined to each sensor node. A given sensor
the unconstrained energy supply of the access point can node will receive packets with an average packet inter-
be exploited. arrival time of L = N λ.
Another field related to infrastructure sensor networks Data packets have a constant duration TD . Control
is the field of paging systems. Several standards have packets (pollings, acknowledgements, traffic indication
been developed over the years, from which POCSAG map beacons) have a constant duration TC .
and FLEX [14, 15]. The techniques used by paging sys- As mentioned in the introduction, we assume a low
tems are useful inspiration sources, but these protocols traffic, where the inter-arrival 1/λ is much larger than
cannot be used as such for infrastructure wireless sen- the sum of the durations of a data packet, of the turn-
sor networks. Paging protocols seek the capacity-energy around and of a control packet:
optimum, while we seek the delay-energy optimum. Low Traffic Assumption: 1/λ À TD + TT + TC
Arrival, wait for transmit from some sensor node at time 0, and that the access
right moment
point wants to send a packet to this sensor node at the
ACCESS WAIT W DATA sampling time L. If the sensor node quartz has a real
POINT frequency of f (1 + θ) instead of f , its clock will have
TP an advance of θL at time L. It is hence needed to start
SENSOR TW ACK the preamble θL in advance. Because the clock of the
NODE
access point might be late, it must target a time 2θL in
Wake up, Wake up, Wake up, advance. Because the clock of the access point might be
T TT TC
medium idle medium idle medium busy, D
DOZE RX TX receive message early, and the clock of the sensor node late, the duration
of the wake-up preamble must be of 4θL. If L is very
Figure 1: WiseMAC - Principle of Operation large, 4θL may be larger that the sampling interval TW .
In those cases, a preamble of duration TW is used.
If the traffic is high, the interval L between transmis-
2.3 WiseMAC
sions will be small, and so the wake-up preamble (4θL).
WiseMAC is based on the preamble sampling tech-
If the traffic is low, the interval between transmissions
nique. This technique consists in periodically sampling
will be high, but at maximum equal to TW . This impor-
the medium to check for activity. By sampling the
tant property makes the WiseMAC protocol adaptive to
medium, we mean listening to the radio channel for a
the traffic. The per-packet overhead decreases in high
short duration, e.g. the duration of a modulation sym-
traffic conditions.
bol. All sensor nodes in a network sample the medium
Overhearing is naturally mitigated when the traffic is
with the same constant period TW . Their relative sam-
high, thanks to the combined use of the preamble sam-
pling schedule offsets are independent. If the medium
pling technique and the minimization of the wake-up
is found busy, a sensor node continues to listen until a
preamble duration. As already mentioned, sensor nodes
data packet is received or until the medium becomes idle
are not synchronized among themselves. Their relative
again. At the access point, a wake-up preamble of dura-
sampling schedule offsets are independent. In high traf-
tion equal to the medium sampling period is transmitted
fic conditions, the duration of the wake-up preamble be-
in front of every data frame to ensure that the receiver
ing smaller than the sampling period, short transmission
will be awake when the data portion of the packet will
are likely to fall in between sampling instants of poten-
arrive. This technique provides a very low power con-
tial overhearers.
sumption when the channel is idle. See [16] and [17] for
details. The disadvantages of this protocol are that the Finally, it is interesting to note that collisions are not
(long) wake-up preambles cause a throughput limitation possible using WiseMAC for a downlink channel, as the
and a large power consumption overhead in reception. access point is the only initiator of transmissions.
The overhead in reception is not only born by the in- 2.4 Periodic Terminal Initiated Polling - PTIP
tended destination, but also by all other nodes overhear- With the PTIP protocol, the access point buffers
ing the transmission. downlink traffic. Sensor nodes regularly send a POLL
The novel idea introduced by WiseMAC consists in packet to the access point to get potentially buffered data.
letting the access point learn the sampling schedule of The access point replies with a DATA packet if one was
all sensor nodes. Knowing the sampling schedule of the buffered, or with a (shorter) control packet if the queue
destination, the access point starts the transmission just for the requesting node was empty. To mitigate colli-
at the right time with a wake-up preamble of minimized sions between sensor nodes, POLL packets are sent us-
duration TP as illustrated in Fig. 1. The access point ing the CSMA protocol. To avoid systematic contentions
keeps an up-to-date table with the sampling schedule of between synchronized nodes, the time interval between
all sensor nodes. The sampling schedule information is POLL transmissions is a random variable with mean
gained through the inclusion in every acknowledgement value TW . The basic principle of operation of PTIP is
packet of the remaining time until the next scheduled illustrated in Fig. 2.
sampling. If the response to the POLL is correctly received, the
The duration of the wake-up preamble must be com- sensor node goes back to sleep until the next scheduled
puted such as to compensate for the drift between the polling time. With PTIP, it is not required to send an ac-
clock at the access point and on the sensor nodes. knowledgement when a downlink DATA packet has been
This drift is proportional to the time since the last re- received correctly. Instead, the POLL is repeated until a
synchronization (i.e. the last time an acknowledgement response is received correctly. To let the access point
was received from a given sensor node). Let θ be the know whether a DATA packet has to be retransmitted or
frequency tolerance of the time-base quartz, TW be the not, the sequence number of the last correctly received
interval between preamble samplings and L the interval DATA packet is piggy-backed on every POLL packet.
between two communications. The required duration of 2.5 IEEE 802.11/802.15.4 Power Save Mode - PSM
the wake-up preamble is
A power save mode (PSM) has been specified in the
IEEE 802.11 standard to permit a lower power consump-
TP = min(4θL, TW ) (1)
tion at the cost of a larger delay [9]. The same scheme
This expression is obtained as follow: Assume that has been selected for the newer IEEE 802.15.4 ZigBee
the access point has received fresh timing information standard [10]. The access point buffers incoming traffic.
ACCESS NO Arrival sensor node that it must poll the access point to down-
DATA DATA
POINT load the following packet. This scheme permits to use
a wake-up interval that is larger than the average inter-
SENSOR
TW
val between the arrivals for a given node (TW > L). It
POLL POLL
NODE permits to reduce the queuing delay at the access point,
TS TC TT TD especially in the event of traffic bursts.
DOZE RX TX
3 Power Consumption and Delay
Figure 2: Periodic Terminal Initiated Polling (PTIP) - Principle
of Operation This section introduces analytical expressions to com-
pute the power consumption and the delay of WiseMAC,
Arrival PTIP and PSM, under the low traffic assumption (1/λ À
ACCESS
POINT
TIM TIM DATA TD + TT + TC ). Due to space limitations, little expla-
nation is given on the derivation of those expressions.
Interested readers are referred to [18] for details.
SENSOR TW
NODE
POLL It can be shown that the average power consumed by
WiseMAC, PTIP and PSM is respectively given by
DOZE RX TX
TS TCDC TC TT TC TT TD
Figure 3: Optimized Power Save Mode (PSM) - Principle of PbR (TS + 1/B)
PW iseM AC = PZ +
Operation TW
PbR (TP /2 + TD + TT ) + PbT TC
+
L
2
A beacon is periodically transmitted with period TW . (T P + TD )
+ PbR (N − 1) (2)
This beacon contains the traffic indication map (TIM), 2LTW
which lists the sensor nodes for which data packets have
been buffered. All sensor nodes wake-up regularly to re- TW PbT TC + PbR (TS + TT + TC )
ceive the TIM. If they discover their address in the TIM, PP T IP = PZ + e− L
TW
they poll the access point to receive the buffered data.
PbT TC + PbR (TS + TT + TD )
The standard requires the access point to reply to a + (3)
L
POLL after a given delay (10 µs in DS 802.11b). In
practice, it is difficult for the access point software to find
the right packet and prepare it for transmission within PbR (TS + TC )
PP SM = PZ + 2θPbR +
the specified delay. Instead, the access point replies to TW
the POLL with an ACK. This instructs the sensor node PbT TC + PbR (TD + 2TT )
+ (4)
to remain in listening mode. As soon as possible, the L
access point sends the DATA packet, which in then ac- Expression (2) is composed of the power consumed in
knowledged back by the sensor node. In summary, the the DOZE state, of the power consumption increments
polling procedure is composed of four packet transmis- caused by the preamble sampling activity (wake-up and
sions: POLL-ACK-DATA-ACK. In this paper, we are in- sense the channel during one radio symbol every TW ),
terested in the basic performance of protocols that would the reception of the packet (listen in average to half
use a traffic indication map. For a fair comparison with of the wake-up preamble, receive the data, turn-around
the other protocols, we consider a version of the PSM the transceiver and send the acknowledgement) and the
protocol, that is fully optimized for low power operation. overhearing of this packet by the N − 1 other sensor
We assume first that access point replies to a POLL with nodes ((TP + TD )2 /2TW is the average duration during
a DATA packet (after the needed delay), and secondly which a transmission of duration TP + TD is overheard
that a DATA packet is not acknowledged (as in PTIP, by some node sampling the medium with period TW , see
the acknowledgement is piggy-backed on the following [18]).
POLL). This procedure is illustrated in Fig. 3. Note that In expression (3), the first term represents the power
sensor nodes must listen to the channel TCDC = 2θTW consumed in DOZE state, the second term the cost of
TW
before the expected start of the TIM packet to compen- useless pollings (e− L is the probability of having no
sate for a potential drift between the access point clock arrivals in between two pollings) and the third the cost
and their clock. of downloading buffered packets.
2.6 More bit In expression (4), the first term represents the power
A very important detail shared by WiseMAC, PTIP consumed in DOZE state. The second term, 2θPbR , ac-
and PSM is the presence of a more bit in the header of counts for the time spent listening to the channel to cover
data packets. When this bit is set to 1, this indicates that the drift between the access point clock and the sen-
more data packets destined to the same sensor node are sor node clock (see [18]). The third term represents the
waiting in the access point buffer. With WiseMAC, this power consumed to power-on and listen to the beacon of
indicates to the sensor node that it must continue to listen duration TC every TW seconds. Finally, the fourth term
after having sent the acknowledgement. The next packet accounts for the transmission of poll packets and the re-
will follow. With PTIP and PSM, this indicates to the ception of data packets, including turning the transceiver
around before the POLL transmission and the DATA re- Param. Value Param. Value
ception. PZ 5 µW TD (50 bytes) 16 ms
The transmission delay is defined as the time elapsed PR 1.8 mW TC (10 bytes) 3.2 ms
between the arrival of a packet at the access point and the PT 27 mW N 10
end of its transmission to the destination sensor node. TS 0.8 ms L 1000 s
TT 0.4 ms θ 30 · 10−6
Under the low traffic assumption, it can be shown that
B 25 kbps
the transmission delay with WiseMAC, PTIP and PSM
is respectively given by Table 1: System Parameters
DW iseM AC = TW /2 + TP + TD (5)
60
Ideal
WiseMAC
DP T IP = TW /2 + TT + TD
Power [µW]
(6) 40 PTIP
PSM
20
DP SM = TW /2 + 2TC + 2TT + TD (7)
Expression (5) is composed of the average time be- 0 −2 −1 0 1 2 3
10 10 10 10 10 10
tween the arrival of a packet at the access point and the 3
TW [s]
10
start of the preamble transmission, the time to transmit 2
10
the preamble and the data.
Delay D [s]
1
10
Expression (6) is composed of the average time be- 10
0
−2 −1 0 1 2 3
to transmit the data packet. 10 10 10
TW [s]
10 10 10